2021
DOI: 10.1016/j.jnca.2020.102894
|View full text |Cite
|
Sign up to set email alerts
|

Tensor based framework for Distributed Denial of Service attack detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Our method achieves a high detection rate of 90% in addition to zero false positive rate for ESynFlood trace, while it achieves a detection rate of 100% with zero false positive rate for both of CICDDoS2019 traces. The proposed method proved its efficiency as it outperforms the previous detection methods in [15], [16], [17], [18] whose detection rate ranged between 98% and 99.9% for CICDDoS2019 dataset although depending on training step Table. II shows that comparison.…”
Section: Odds Ratio Valuesmentioning
confidence: 84%
See 1 more Smart Citation
“…Our method achieves a high detection rate of 90% in addition to zero false positive rate for ESynFlood trace, while it achieves a detection rate of 100% with zero false positive rate for both of CICDDoS2019 traces. The proposed method proved its efficiency as it outperforms the previous detection methods in [15], [16], [17], [18] whose detection rate ranged between 98% and 99.9% for CICDDoS2019 dataset although depending on training step Table. II shows that comparison.…”
Section: Odds Ratio Valuesmentioning
confidence: 84%
“…In [17] a novel timebased anomaly detection system is presented, where that system leverages an autoencoder. By using concepts of machine learning supervised classification, a tensor based framework is proposed for DDoS attack detection [18]. Also many signal processing techniques have been used to detect anomalies in network traffic [19].…”
Section: Introductionmentioning
confidence: 99%
“…Network-based attacks represent threats that originate from and are regulated by devices other than those under attack. A DDoS attack is a network-based attack example in which systems of intrusion prevention and firewalls are countermeasures to this attack type (Maranhão et al, 2021). A host-based IDS monitors and analyses the computing system internals.…”
Section: Methodsmentioning
confidence: 99%
“…Only five attacks were considered in this research. Binary classification was done in [20,26] which produced higher accuracy levels than multiclass classification [29]. Furthermore, AdaBoost and deep learning techniques were always slower than LGBM and XGBoost [30].…”
Section: Figure 8 Classification Report With Udp-lagmentioning
confidence: 99%